US20160098343A1 - System and method for smart framework for network backup software debugging - Google Patents

System and method for smart framework for network backup software debugging Download PDF

Info

Publication number
US20160098343A1
US20160098343A1 US14/968,773 US201514968773A US2016098343A1 US 20160098343 A1 US20160098343 A1 US 20160098343A1 US 201514968773 A US201514968773 A US 201514968773A US 2016098343 A1 US2016098343 A1 US 2016098343A1
Authority
US
United States
Prior art keywords
backup
log file
indication
importance value
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US14/968,773
Other versions
US9977726B2 (en
Inventor
Gururaj Kulkarni
Vladimir Mandic
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
EMC Corp
Original Assignee
EMC Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Assigned to EMC CORPORATION reassignment EMC CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: MANDIC, VLADIMIR, KULKARNI, GURURAJ
Priority to US14/968,773 priority Critical patent/US9977726B2/en
Application filed by EMC Corp filed Critical EMC Corp
Publication of US20160098343A1 publication Critical patent/US20160098343A1/en
Assigned to CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH, AS COLLATERAL AGENT reassignment CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH, AS COLLATERAL AGENT SECURITY AGREEMENT Assignors: ASAP SOFTWARE EXPRESS, INC., AVENTAIL LLC, CREDANT TECHNOLOGIES, INC., DELL INTERNATIONAL L.L.C., DELL MARKETING L.P., DELL PRODUCTS L.P., DELL SOFTWARE INC., DELL SYSTEMS CORPORATION, DELL USA L.P., EMC CORPORATION, EMC IP Holding Company LLC, FORCE10 NETWORKS, INC., MAGINATICS LLC, MOZY, INC., SCALEIO LLC, SPANNING CLOUD APPS LLC, WYSE TECHNOLOGY L.L.C.
Assigned to THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT reassignment THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT SECURITY AGREEMENT Assignors: ASAP SOFTWARE EXPRESS, INC., AVENTAIL LLC, CREDANT TECHNOLOGIES, INC., DELL INTERNATIONAL L.L.C., DELL MARKETING L.P., DELL PRODUCTS L.P., DELL SOFTWARE INC., DELL SYSTEMS CORPORATION, DELL USA L.P., EMC CORPORATION, EMC IP Holding Company LLC, FORCE10 NETWORKS, INC., MAGINATICS LLC, MOZY, INC., SCALEIO LLC, SPANNING CLOUD APPS LLC, WYSE TECHNOLOGY L.L.C.
Assigned to EMC IP Holding Company LLC reassignment EMC IP Holding Company LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: EMC CORPORATION
Publication of US9977726B2 publication Critical patent/US9977726B2/en
Application granted granted Critical
Assigned to THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A. reassignment THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A. SECURITY AGREEMENT Assignors: CREDANT TECHNOLOGIES, INC., DELL INTERNATIONAL L.L.C., DELL MARKETING L.P., DELL PRODUCTS L.P., DELL USA L.P., EMC CORPORATION, EMC IP Holding Company LLC, FORCE10 NETWORKS, INC., WYSE TECHNOLOGY L.L.C.
Assigned to THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A. reassignment THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A. SECURITY AGREEMENT Assignors: CREDANT TECHNOLOGIES INC., DELL INTERNATIONAL L.L.C., DELL MARKETING L.P., DELL PRODUCTS L.P., DELL USA L.P., EMC CORPORATION, EMC IP Holding Company LLC, FORCE10 NETWORKS, INC., WYSE TECHNOLOGY L.L.C.
Assigned to AVENTAIL LLC, DELL SOFTWARE INC., CREDANT TECHNOLOGIES, INC., DELL PRODUCTS L.P., FORCE10 NETWORKS, INC., DELL MARKETING L.P., EMC IP Holding Company LLC, WYSE TECHNOLOGY L.L.C., EMC CORPORATION, DELL SYSTEMS CORPORATION, DELL INTERNATIONAL, L.L.C., MAGINATICS LLC, ASAP SOFTWARE EXPRESS, INC., MOZY, INC., DELL USA L.P., SCALEIO LLC reassignment AVENTAIL LLC RELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS). Assignors: CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH
Assigned to DELL MARKETING CORPORATION (SUCCESSOR-IN-INTEREST TO FORCE10 NETWORKS, INC. AND WYSE TECHNOLOGY L.L.C.), DELL INTERNATIONAL L.L.C., DELL MARKETING L.P. (ON BEHALF OF ITSELF AND AS SUCCESSOR-IN-INTEREST TO CREDANT TECHNOLOGIES, INC.), SCALEIO LLC, EMC IP HOLDING COMPANY LLC (ON BEHALF OF ITSELF AND AS SUCCESSOR-IN-INTEREST TO MOZY, INC.), DELL USA L.P., DELL PRODUCTS L.P., DELL MARKETING CORPORATION (SUCCESSOR-IN-INTEREST TO ASAP SOFTWARE EXPRESS, INC.), EMC CORPORATION (ON BEHALF OF ITSELF AND AS SUCCESSOR-IN-INTEREST TO MAGINATICS LLC) reassignment DELL MARKETING CORPORATION (SUCCESSOR-IN-INTEREST TO FORCE10 NETWORKS, INC. AND WYSE TECHNOLOGY L.L.C.) RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (040136/0001) Assignors: THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT
Assigned to EMC CORPORATION (ON BEHALF OF ITSELF AND AS SUCCESSOR-IN-INTEREST TO MAGINATICS LLC), DELL MARKETING CORPORATION (SUCCESSOR-IN-INTEREST TO FORCE10 NETWORKS, INC. AND WYSE TECHNOLOGY L.L.C.), DELL USA L.P., EMC IP HOLDING COMPANY LLC (ON BEHALF OF ITSELF AND AS SUCCESSOR-IN-INTEREST TO MOZY, INC.), DELL MARKETING L.P. (ON BEHALF OF ITSELF AND AS SUCCESSOR-IN-INTEREST TO CREDANT TECHNOLOGIES, INC.), DELL PRODUCTS L.P., SCALEIO LLC, DELL INTERNATIONAL L.L.C., DELL MARKETING CORPORATION (SUCCESSOR-IN-INTEREST TO ASAP SOFTWARE EXPRESS, INC.) reassignment EMC CORPORATION (ON BEHALF OF ITSELF AND AS SUCCESSOR-IN-INTEREST TO MAGINATICS LLC) RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (045455/0001) Assignors: THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT
Active legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/362Software debugging
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/362Software debugging
    • G06F11/3636Software debugging by tracing the execution of the program
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/0703Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
    • G06F11/0706Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation the processing taking place on a specific hardware platform or in a specific software environment
    • G06F11/0709Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation the processing taking place on a specific hardware platform or in a specific software environment in a distributed system consisting of a plurality of standalone computer nodes, e.g. clusters, client-server systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/0703Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
    • G06F11/0766Error or fault reporting or storing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/0703Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
    • G06F11/0766Error or fault reporting or storing
    • G06F11/0769Readable error formats, e.g. cross-platform generic formats, human understandable formats
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/0703Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
    • G06F11/0766Error or fault reporting or storing
    • G06F11/0775Content or structure details of the error report, e.g. specific table structure, specific error fields
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1458Management of the backup or restore process
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3664Environments for testing or debugging software

Definitions

  • networked backup software has a command line utility enabling logging of extended debug information for backup software processes.
  • abnormal issues such as crash, core or hang issues
  • logging of extended debug information can be enabled on suspicious or related process to get more information.
  • This requires human intervention and is ad-hoc in nature.
  • a user or backup administrator who would like to troubleshoot the backup application related issues has to login to the machine having issues and start the utility for a process he would like to debug. If there are many components spread across different machines with many processes to debug, the user needs to login to each component and start the utility for each process.
  • FIG. 1 is a block diagram illustrating an embodiment of a system for network backup software debugging.
  • FIG. 2A is a diagram illustrating an embodiment of a user interface for a system for network backup software debugging.
  • FIG. 2B is a diagram illustrating an embodiment of a user interface for a system for network backup software debugging.
  • FIG. 2C is a diagram illustrating an embodiment of a user interface for a system for network backup software debugging.
  • FIG. 2D is a diagram illustrating an embodiment of a user interface for a system for network backup software debugging.
  • FIG. 3 is a flow diagram illustrating an embodiment of a process for logging debugging messages.
  • FIG. 4 is a flow diagram illustrating an embodiment of a process for network backup software debugging.
  • FIGS. 5A and 5B are flow diagrams illustrating an embodiment of a process for receiving an indication to change a verbosity level via a user interface.
  • the invention can be implemented in numerous ways, including as a process; an apparatus; a system; a composition of matter; a computer program product embodied on a computer readable storage medium; and/or a processor, such as a processor configured to execute instructions stored on and/or provided by a memory coupled to the processor.
  • these implementations, or any other form that the invention may take, may be referred to as techniques.
  • the order of the steps of disclosed processes may be altered within the scope of the invention.
  • a component such as a processor or a memory described as being configured to perform a task may be implemented as a general component that is temporarily configured to perform the task at a given time or a specific component that is manufactured to perform the task.
  • the term ‘processor’ refers to one or more devices, circuits, and/or processing cores configured to process data, such as computer program instructions.
  • a system for network backup software debugging comprises a processor configured to determine a set of available components of a selected component type, and determine a set of backup processes running on the component.
  • the system for network software debugging additionally comprises an input interface configured to receive a selection of a backup process of the set of backup processes, and an output interface configured to provide an indication of a change of verbosity level.
  • the system for network debugging additionally comprises a memory coupled to the processor and configured to provide the processor with instructions.
  • the system for network debugging comprises a system for automation of the logging of debugging information.
  • the system comprises a user interface for a network administrator enabling the network administrator to select a machine of interest and a process of interest running on the machine, and schedule logging of debugging messages of a desired verbosity for the process.
  • the network administrator may enter in a start time for the logging, or allow a default start time to be used (e.g., immediately).
  • the network administrator may enter a stop time for the logging, or allow a default time to be used (e.g., one hour from the start time).
  • the log is transferred from the selected machine to the network administrator machine. Data from the log can then be provided for display.
  • FIG. 1 is a block diagram illustrating an embodiment of a system for network backup software debugging.
  • network 100 comprises one or more of the following: a local area network, a wide area network, a wired network, a wireless network, the Internet, an intranet, a storage area network, or any other appropriate communication network.
  • client system 106 comprises a client system (e.g., a computing system for operation by a user).
  • client system 106 comprises a system accessed by a user directly (e.g., the user is in proximity with client system 106 ).
  • client system 106 comprises a system accessed by a user remotely (e.g., the user is not in proximity with client system 106 , and accesses client system 106 via network 100 and a separate user system).
  • Client system 106 comprises a system running enterprise software (e.g., business software for creating data, storing data, transmitting data, receiving data, etc.).
  • client system 106 comprises a system for storing data on a backup system or retrieving stored data from a backup system.
  • Backup storage system 102 comprises a computer system for backing up data. Backup system 102 backs up data stored on client system 106 .
  • backup system 102 performs full backups of the data on client system 106 (e.g., makes complete copies of the data), performs incremental backups of the data on client system 106 (e.g., makes copies of data modified since the last backup), performs a combination of full and incremental backups of the data on client system 106 , or performs any other appropriate kind of backup.
  • data stored on backup system 102 comprises deduplicated backup data (e.g., data is stored in such a way that multiple copies of the same data are only stored a single time).
  • deduplicated backup data is segmented (e.g., broken into chunks which can then be compared to determine duplicate data).
  • deduplicated backup data is segmented using a hash function (e.g., a hash function is used to determine where to divide data into segments).
  • a hash function e.g., a hash function is used to determine where to divide data into segments.
  • Backup server system 104 comprises a server system for controlling backup storage system 102 and client system 106 .
  • FIG. 2A is a diagram illustrating an embodiment of a user interface for a system for network backup software debugging.
  • user interface 200 is running on a backup server system (e.g., backup server system 104 of FIG. 1 ).
  • user interface 200 is operated by a system administrator.
  • user interface 200 comprises an interface for selecting a component type.
  • user interface 200 comprises an interface for selecting a component type as part of a process for network backup software debugging.
  • a system administrator can use user interface 200 to select a component type (e.g., client systems, backup storage systems, or backup server systems) to begin a process for network backup software debugging.
  • a component type e.g., client systems, backup storage systems, or backup server systems
  • a set of available components of the component type is displayed.
  • FIG. 2B is a diagram illustrating an embodiment of a user interface for a system for network backup software debugging.
  • user interface 210 is running on a backup server system (e.g., backup server system 104 of FIG. 1 ).
  • user interface 210 is operated by a system administrator.
  • user interface 210 comprises an interface for selecting a component from a set of available components.
  • the set of available components comprises the set of available components of a previously selected type (e.g., of the type selected using user interface 200 of FIG. 2A ).
  • a system administrator can use user interface 210 to select a component (e.g., backup storage system A, backup storage system B, backup storage system C, backup storage system D, backup storage system E, etc.) to continue a process for network backup software debugging.
  • a component e.g., backup storage system A, backup storage system B, backup storage system C, backup storage system D, backup storage system E, etc.
  • a set of backup processes is displayed.
  • FIG. 2C is a diagram illustrating an embodiment of a user interface for a system for network backup software debugging.
  • user interface 220 is running on a backup server system (e.g., backup server system 104 of FIG. 1 ).
  • user interface 220 is operated by a system administrator.
  • user interface 220 comprises an interface for selecting a backup process from a set of backup processes.
  • the set of backup processes comprises the set of backup processes running on a previously selected component (e.g., backup processes running on the component selected using user interface 210 of FIG. 2B ).
  • a system administrator can use user interface 220 to select a backup process (e.g., a backup storage management process, a media management process, a backup client process, a backup save process, a backup recover process, etc.) to continue a process for network backup software debugging.
  • a backup process e.g., a backup storage management process, a media management process, a backup client process, a backup save process, a backup recover process, etc.
  • a user interface for selecting a verbosity level, start time, and stop time is displayed.
  • FIG. 2D is a diagram illustrating an embodiment of a user interface for a system for network backup software debugging.
  • user interface 230 is running on a backup server system (e.g., backup server system 104 of FIG. 1 ).
  • user interface 230 is operated by a system administrator.
  • user interface 230 comprises an interface for selecting a verbosity level, start time, and stop time.
  • a verbosity level comprises a verbosity level of debugging messages for a process.
  • a start time comprises a start time for logging debugging messages for a process.
  • a start time is not entered, a default start time is determined (e.g., immediately, in one hour, at midnight, etc.).
  • a stop time comprises a stop time for logging debugging messages for a process.
  • a default stop time is determined (e.g., one hour from the start time, one day from the start time, at 6 AM, etc.).
  • a verbosity level, start time, and stop time have been selected, scheduling of network backup software debugging is complete.
  • a debugging message log is received by the backup server system.
  • data from the log is provided for display.
  • FIG. 3 is a flow diagram illustrating an embodiment of a process for logging debugging messages.
  • the process of FIG. 3 is executed by a client system (e.g., client system 106 of FIG. 1 ).
  • an indication of a change of verbosity level is received from a server system (e.g., backup server system 104 of FIG. 1 ).
  • the indication of a change of verbosity level comprises an indication of a new verbosity level (e.g., level 2, level 5, etc.).
  • the indication of a change of verbosity level comprises a start time (e.g., when the verbosity level should change).
  • the indication of a change of verbosity level comprises a stop time (e.g., when the verbosity level should change back).
  • an indication of a change of verbosity level comprises a process (e.g., a process to change the verbosity level for).
  • the indication of a change of verbosity level comprises an indication to log debug messages.
  • it is determined if it is time to change the verbosity level (e.g., if it is the start time). If it is determined in 302 that it is not the start time, control passes to 304 . In 304 , the process waits.
  • the process waits 1 millisecond, 500 milliseconds, 10 seconds, 2 minutes, or any other appropriate period of time. Control then passes to 302 . If it is determined in 302 that it is the start time, control passes to 306 . In 306 , debug messages are logged at the indicated verbosity level. In some embodiments, logging debug messages comprises storing debug messages generated by the process being logged in a log file. In some embodiments, debug messages comprise an associated importance value, and only messages with an importance value greater than or equal to a threshold importance value are stored in a log file.
  • the threshold importance value is determined by computing a function of the verbosity level (e.g., the threshold importance value is equal to the verbosity level, the threshold importance value is equal to ten minus the verbosity level, etc.).
  • it is determined whether it is time to stop logging e.g., if it is the stop time. If it is determined in 308 that it is not time to stop logging, control passes to 310 .
  • the process waits. In various embodiments, the process waits 1 millisecond, 500 milliseconds, 10 seconds, 2 minutes, or any other appropriate period of time. Control then passes to 308 .
  • the debug message log is provided to the server system.
  • an indication is provided to the server system that logging is complete.
  • the debug message log is provided to the server system in response to a request for the debug message log.
  • FIG. 4 is a flow diagram illustrating an embodiment of a process for network backup software debugging.
  • the process of FIG. 4 is executed by a backup server system (e.g., backup server system 104 of FIG. 1 ).
  • a backup server system e.g., backup server system 104 of FIG. 1 .
  • an indication is received from a user via a user interface to change a verbosity level.
  • the user comprises a system administrator.
  • the user interface comprises the user interface shown in FIGS. 2A, 2B, 2C, and 2D .
  • the indication of a change of verbosity level is provided to a client system.
  • a log is received from the client system.
  • an indication that logging is complete is received from the client system.
  • the backup server system requests the log from the client system, and receives the log in response to the request.
  • FIGS. 5A and 5B are flow diagrams illustrating an embodiment of a process for receiving an indication to change a verbosity level via a user interface.
  • the process of FIG. 5 implements 400 of FIG. 4 .
  • a user interface for selection of a component type is provided.
  • the user interface comprises user interface 200 of FIG. 2A .
  • a selection of a component type is received.
  • a set of available components of the component type is determined.
  • a set of available components of the component type is determined by querying a network, by checking a stored list of components, or in any other appropriate way.
  • the set of available components is provided for display to a user (e.g., via user interface 210 of FIG. 2B ).
  • a selection of a component of the set of available components is received.
  • a set of backup processes running on the component is determined.
  • a set of backup processes running on the component is determined by querying the component.
  • the set of backup processes is provided for display to a user (e.g., via user interface 220 of FIG. 2C ).
  • a selection of a backup process of the set of backup processes is received.
  • the user is provided with an interface for selection of a verbosity level, a start time, and a stop time.
  • a selection is received of verbosity level, start time, and stop time.
  • the verbosity level, the start time, and the stop time are provided to the selected backup process on the component of component type.
  • the verbosity level, start time, and stop time are received from a user and provided to a connected system.
  • the verbosity level is changed at a start time and a stop time by providing instructions to a connected system (e.g., a set of backup processes that has been selected for a change of verbosity level).
  • the verbosity level change is achieved using a single instruction that is translated to a start and a stop instruction on a connected system.
  • the verbosity level is explicitly changed from a server system by individual instructions to change a verbosity level at each of a start time and a stop time separately.
  • a backup process (e.g., a backup process of the set of backup processes determined in 510 ) comprises a network backup system client process, a network backup system save process, a network backup system recover process, a network backup system media management daemon, a network backup system storage management daemon, a network backup system server master process, a network backup system server process for media database management, a network backup system server process for spawning and monitoring jobs, a network backup system server process for providing client file index management services, a network backup system server process for managing media library operations, a network backup system audit log process, or any other appropriate backup process.

Abstract

A system for network software debugging comprises a processor, an input interface, and an output interface. The processor is configured to determine a set of available components of a selected component type, and determine a set of backup processes running on the component. The input interface is configured to receive a selection of a backup process of the set of backup processes. The output interface is configured to provide an indication of a change of verbosity level.

Description

    CROSS REFERENCE TO OTHER APPLICATIONS
  • This application is a continuation of co-pending U.S. patent application Ser. No. 14/137,774, entitled SYSTEM AND METHOD FOR SMART FRAMEWORK FOR NETWORK BACKUP SOFTWARE DEBUGGING filed Dec. 20, 2013 which is incorporated herein by reference for all purposes
  • BACKGROUND OF THE INVENTION
  • Typically, networked backup software has a command line utility enabling logging of extended debug information for backup software processes. Whenever abnormal issues occur, such as crash, core or hang issues, logging of extended debug information can be enabled on suspicious or related process to get more information. This requires human intervention and is ad-hoc in nature. A user or backup administrator who would like to troubleshoot the backup application related issues has to login to the machine having issues and start the utility for a process he would like to debug. If there are many components spread across different machines with many processes to debug, the user needs to login to each component and start the utility for each process.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • Various embodiments of the invention are disclosed in the following detailed description and the accompanying drawings.
  • FIG. 1 is a block diagram illustrating an embodiment of a system for network backup software debugging.
  • FIG. 2A is a diagram illustrating an embodiment of a user interface for a system for network backup software debugging.
  • FIG. 2B is a diagram illustrating an embodiment of a user interface for a system for network backup software debugging.
  • FIG. 2C is a diagram illustrating an embodiment of a user interface for a system for network backup software debugging.
  • FIG. 2D is a diagram illustrating an embodiment of a user interface for a system for network backup software debugging.
  • FIG. 3 is a flow diagram illustrating an embodiment of a process for logging debugging messages.
  • FIG. 4 is a flow diagram illustrating an embodiment of a process for network backup software debugging.
  • FIGS. 5A and 5B are flow diagrams illustrating an embodiment of a process for receiving an indication to change a verbosity level via a user interface.
  • DETAILED DESCRIPTION
  • The invention can be implemented in numerous ways, including as a process; an apparatus; a system; a composition of matter; a computer program product embodied on a computer readable storage medium; and/or a processor, such as a processor configured to execute instructions stored on and/or provided by a memory coupled to the processor. In this specification, these implementations, or any other form that the invention may take, may be referred to as techniques. In general, the order of the steps of disclosed processes may be altered within the scope of the invention. Unless stated otherwise, a component such as a processor or a memory described as being configured to perform a task may be implemented as a general component that is temporarily configured to perform the task at a given time or a specific component that is manufactured to perform the task. As used herein, the term ‘processor’ refers to one or more devices, circuits, and/or processing cores configured to process data, such as computer program instructions.
  • A detailed description of one or more embodiments of the invention is provided below along with accompanying figures that illustrate the principles of the invention. The invention is described in connection with such embodiments, but the invention is not limited to any embodiment. The scope of the invention is limited only by the claims and the invention encompasses numerous alternatives, modifications and equivalents. Numerous specific details are set forth in the following description in order to provide a thorough understanding of the invention. These details are provided for the purpose of example and the invention may be practiced according to the claims without some or all of these specific details. For the purpose of clarity, technical material that is known in the technical fields related to the invention has not been described in detail so that the invention is not unnecessarily obscured.
  • A system for network backup software debugging is disclosed. The system for network software debugging comprises a processor configured to determine a set of available components of a selected component type, and determine a set of backup processes running on the component. The system for network software debugging additionally comprises an input interface configured to receive a selection of a backup process of the set of backup processes, and an output interface configured to provide an indication of a change of verbosity level. The system for network debugging additionally comprises a memory coupled to the processor and configured to provide the processor with instructions.
  • The system for network debugging comprises a system for automation of the logging of debugging information. The system comprises a user interface for a network administrator enabling the network administrator to select a machine of interest and a process of interest running on the machine, and schedule logging of debugging messages of a desired verbosity for the process. The network administrator may enter in a start time for the logging, or allow a default start time to be used (e.g., immediately). The network administrator may enter a stop time for the logging, or allow a default time to be used (e.g., one hour from the start time). When the logging is complete, the log is transferred from the selected machine to the network administrator machine. Data from the log can then be provided for display.
  • FIG. 1 is a block diagram illustrating an embodiment of a system for network backup software debugging. In the example shown, FIG. 1 comprises network 100. In various embodiments, network 100 comprises one or more of the following: a local area network, a wide area network, a wired network, a wireless network, the Internet, an intranet, a storage area network, or any other appropriate communication network. In the example shown, client system 106 comprises a client system (e.g., a computing system for operation by a user). In some embodiments, client system 106 comprises a system accessed by a user directly (e.g., the user is in proximity with client system 106). In some embodiments, client system 106 comprises a system accessed by a user remotely (e.g., the user is not in proximity with client system 106, and accesses client system 106 via network 100 and a separate user system). Client system 106 comprises a system running enterprise software (e.g., business software for creating data, storing data, transmitting data, receiving data, etc.). In some embodiments, client system 106 comprises a system for storing data on a backup system or retrieving stored data from a backup system. In various embodiments, there are 1, 4, 17, 22, 1459, or any other appropriate number of client systems communicating with network 100. Backup storage system 102 comprises a computer system for backing up data. Backup system 102 backs up data stored on client system 106. In various embodiments, backup system 102 performs full backups of the data on client system 106 (e.g., makes complete copies of the data), performs incremental backups of the data on client system 106 (e.g., makes copies of data modified since the last backup), performs a combination of full and incremental backups of the data on client system 106, or performs any other appropriate kind of backup. In some embodiments, data stored on backup system 102 comprises deduplicated backup data (e.g., data is stored in such a way that multiple copies of the same data are only stored a single time). In some embodiments, deduplicated backup data is segmented (e.g., broken into chunks which can then be compared to determine duplicate data). In some embodiments, deduplicated backup data is segmented using a hash function (e.g., a hash function is used to determine where to divide data into segments). In various embodiments, there are 1, 2, 7, 12, 45, 138, or any other appropriate number of backup storage systems communicating with network 100. Backup server system 104 comprises a server system for controlling backup storage system 102 and client system 106.
  • FIG. 2A is a diagram illustrating an embodiment of a user interface for a system for network backup software debugging. In some embodiments, user interface 200 is running on a backup server system (e.g., backup server system 104 of FIG. 1). In some embodiments, user interface 200 is operated by a system administrator. In the example shown, user interface 200 comprises an interface for selecting a component type. In some embodiments, user interface 200 comprises an interface for selecting a component type as part of a process for network backup software debugging. A system administrator can use user interface 200 to select a component type (e.g., client systems, backup storage systems, or backup server systems) to begin a process for network backup software debugging. In some embodiments, when a component type is selected, a set of available components of the component type is displayed.
  • FIG. 2B is a diagram illustrating an embodiment of a user interface for a system for network backup software debugging. In some embodiments, user interface 210 is running on a backup server system (e.g., backup server system 104 of FIG. 1). In some embodiments, user interface 210 is operated by a system administrator. In the example shown, user interface 210 comprises an interface for selecting a component from a set of available components. In some embodiments, the set of available components comprises the set of available components of a previously selected type (e.g., of the type selected using user interface 200 of FIG. 2A). A system administrator can use user interface 210 to select a component (e.g., backup storage system A, backup storage system B, backup storage system C, backup storage system D, backup storage system E, etc.) to continue a process for network backup software debugging. In some embodiments, when a component is selected, a set of backup processes is displayed.
  • FIG. 2C is a diagram illustrating an embodiment of a user interface for a system for network backup software debugging. In some embodiments, user interface 220 is running on a backup server system (e.g., backup server system 104 of FIG. 1). In some embodiments, user interface 220 is operated by a system administrator. In the example shown, user interface 220 comprises an interface for selecting a backup process from a set of backup processes. In some embodiments, the set of backup processes comprises the set of backup processes running on a previously selected component (e.g., backup processes running on the component selected using user interface 210 of FIG. 2B). A system administrator can use user interface 220 to select a backup process (e.g., a backup storage management process, a media management process, a backup client process, a backup save process, a backup recover process, etc.) to continue a process for network backup software debugging. In some embodiments, when a backup process is selected, a user interface for selecting a verbosity level, start time, and stop time is displayed.
  • FIG. 2D is a diagram illustrating an embodiment of a user interface for a system for network backup software debugging. In some embodiments, user interface 230 is running on a backup server system (e.g., backup server system 104 of FIG. 1). In some embodiments, user interface 230 is operated by a system administrator. In the example shown, user interface 230 comprises an interface for selecting a verbosity level, start time, and stop time. In some embodiments, a verbosity level comprises a verbosity level of debugging messages for a process. In some embodiments, a start time comprises a start time for logging debugging messages for a process. In some embodiments, if a start time is not entered, a default start time is determined (e.g., immediately, in one hour, at midnight, etc.). In some embodiments, a stop time comprises a stop time for logging debugging messages for a process. In some embodiments, if a stop time is not entered, a default stop time is determined (e.g., one hour from the start time, one day from the start time, at 6 AM, etc.). In some embodiments, when a verbosity level, start time, and stop time have been selected, scheduling of network backup software debugging is complete. In some embodiments, after the network backup software debugging process has finished (e.g., after the stop time), a debugging message log is received by the backup server system. In some embodiments, data from the log is provided for display.
  • FIG. 3 is a flow diagram illustrating an embodiment of a process for logging debugging messages. In some embodiments, the process of FIG. 3 is executed by a client system (e.g., client system 106 of FIG. 1). In the example shown, in 300, an indication of a change of verbosity level is received from a server system (e.g., backup server system 104 of FIG. 1). In some embodiments, the indication of a change of verbosity level comprises an indication of a new verbosity level (e.g., level 2, level 5, etc.). In some embodiments, the indication of a change of verbosity level comprises a start time (e.g., when the verbosity level should change). In some embodiments, the indication of a change of verbosity level comprises a stop time (e.g., when the verbosity level should change back). In some embodiments, an indication of a change of verbosity level comprises a process (e.g., a process to change the verbosity level for). In some embodiments, the indication of a change of verbosity level comprises an indication to log debug messages. In 302, it is determined if it is time to change the verbosity level (e.g., if it is the start time). If it is determined in 302 that it is not the start time, control passes to 304. In 304, the process waits. In various embodiments, the process waits 1 millisecond, 500 milliseconds, 10 seconds, 2 minutes, or any other appropriate period of time. Control then passes to 302. If it is determined in 302 that it is the start time, control passes to 306. In 306, debug messages are logged at the indicated verbosity level. In some embodiments, logging debug messages comprises storing debug messages generated by the process being logged in a log file. In some embodiments, debug messages comprise an associated importance value, and only messages with an importance value greater than or equal to a threshold importance value are stored in a log file. In some embodiments, the threshold importance value is determined by computing a function of the verbosity level (e.g., the threshold importance value is equal to the verbosity level, the threshold importance value is equal to ten minus the verbosity level, etc.). In 308, it is determined whether it is time to stop logging (e.g., if it is the stop time. If it is determined in 308 that it is not time to stop logging, control passes to 310. In 310, the process waits. In various embodiments, the process waits 1 millisecond, 500 milliseconds, 10 seconds, 2 minutes, or any other appropriate period of time. Control then passes to 308. If it is determined in 310 that it is time to stop logging, control passes to 312. In 312, the debug message log is provided to the server system. In some embodiments, an indication is provided to the server system that logging is complete. In some embodiments, the debug message log is provided to the server system in response to a request for the debug message log.
  • FIG. 4 is a flow diagram illustrating an embodiment of a process for network backup software debugging. In some embodiments, the process of FIG. 4 is executed by a backup server system (e.g., backup server system 104 of FIG. 1). In the example shown, in 400, an indication is received from a user via a user interface to change a verbosity level. In some embodiments, the user comprises a system administrator. In some embodiments, the user interface comprises the user interface shown in FIGS. 2A, 2B, 2C, and 2D. In 402, the indication of a change of verbosity level is provided to a client system. In 404, a log is received from the client system. In some embodiments, an indication that logging is complete is received from the client system. In some embodiments, the backup server system requests the log from the client system, and receives the log in response to the request.
  • FIGS. 5A and 5B are flow diagrams illustrating an embodiment of a process for receiving an indication to change a verbosity level via a user interface. In some embodiments, the process of FIG. 5 implements 400 of FIG. 4. In the example shown, in 500, a user interface for selection of a component type is provided. In some embodiments, the user interface comprises user interface 200 of FIG. 2A. In 502, a selection of a component type is received. In 504, a set of available components of the component type is determined. In various embodiments, a set of available components of the component type is determined by querying a network, by checking a stored list of components, or in any other appropriate way. In 506, the set of available components is provided for display to a user (e.g., via user interface 210 of FIG. 2B). In 508, a selection of a component of the set of available components is received. In 510, a set of backup processes running on the component is determined. In some embodiments, a set of backup processes running on the component is determined by querying the component. In 512, the set of backup processes is provided for display to a user (e.g., via user interface 220 of FIG. 2C). In 514, a selection of a backup process of the set of backup processes is received.
  • In 516, the user is provided with an interface for selection of a verbosity level, a start time, and a stop time. In 518, a selection is received of verbosity level, start time, and stop time. In 520, the verbosity level, the start time, and the stop time are provided to the selected backup process on the component of component type.
  • In some embodiments, the verbosity level, start time, and stop time are received from a user and provided to a connected system. In some embodiments, the verbosity level is changed at a start time and a stop time by providing instructions to a connected system (e.g., a set of backup processes that has been selected for a change of verbosity level). In some embodiments, the verbosity level change is achieved using a single instruction that is translated to a start and a stop instruction on a connected system. In some embodiments, the verbosity level is explicitly changed from a server system by individual instructions to change a verbosity level at each of a start time and a stop time separately.
  • In various embodiments, a backup process (e.g., a backup process of the set of backup processes determined in 510) comprises a network backup system client process, a network backup system save process, a network backup system recover process, a network backup system media management daemon, a network backup system storage management daemon, a network backup system server master process, a network backup system server process for media database management, a network backup system server process for spawning and monitoring jobs, a network backup system server process for providing client file index management services, a network backup system server process for managing media library operations, a network backup system audit log process, or any other appropriate backup process.
  • Although the foregoing embodiments have been described in some detail for purposes of clarity of understanding, the invention is not limited to the details provided. There are many alternative ways of implementing the invention. The disclosed embodiments are illustrative and not restrictive.

Claims (20)

What is claimed is:
1. A system for logging debugging messages, comprising:
an input interface configured to receive an indication of a change of verbosity level;
a processor configured to:
store in a log file debug messages having an importance value associated with the indication; and
an output interface configured to provide the log file to a backup server.
2. The system of claim 1, wherein the indication comprises a start time.
3. The system of claim 2, wherein the processor is further configured to wait until the start time to store the debug messages in the log file.
4. The system of claim 1, wherein the indication comprises a stop time.
5. The system of claim 4, wherein the processor is further configured to store the debug messages in the log file until the stop time.
6. The system of claim 1, wherein the indication comprises a process.
7. The system of claim 1, wherein the debug messages are stored in the log file in the event the importance value is greater than a threshold importance value.
8. The system of claim 7, wherein the threshold importance value is based on a function of the verbosity level.
9. The system of claim 1, wherein the processor is further configured to provide a completion indication to the backup server.
10. The system of claim 1, wherein the log file is provided to the backup server in response to a request.
11. A method of logging debugging messages, comprising:
receiving an indication of a change of verbosity level;
storing in a log file debug messages having an importance value associated with the indication; and
providing the log file to a backup server.
12. The method of claim 11, wherein the indication comprises a start time.
13. The method of claim 12, further comprising waiting until the start time to store the debug messages in the log file.
14. The method of claim 11, wherein the indication comprises a stop time.
15. The method of claim 14, further comprising storing the debug messages in the log file until the stop time.
16. The method of claim 11, wherein the debug messages are stored in the log file in the event the importance value is greater than a threshold importance value.
17. The method of claim 16, wherein the threshold importance value is based on a function of the verbosity level.
18. A computer program product for logging debugging messages, the computer program product being embodied in a non-transitory computer readable storage medium and comprising computer instructions for:
receiving an indication of a change of verbosity level;
storing in a log file debug messages having an importance value associated with the indication; and
providing the log file to a backup server.
19. The computer program product of claim 18, wherein the debug messages are stored in the log file in the event the importance value is greater than a threshold importance value.
20. The computer program product of claim 19, the threshold importance value is based on a function of the verbosity level.
US14/968,773 2013-12-20 2015-12-14 System and method for smart framework for network backup software debugging Active 2034-03-27 US9977726B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US14/968,773 US9977726B2 (en) 2013-12-20 2015-12-14 System and method for smart framework for network backup software debugging

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US14/137,774 US9244811B1 (en) 2013-12-20 2013-12-20 System and method for smart framework for network backup software debugging
US14/968,773 US9977726B2 (en) 2013-12-20 2015-12-14 System and method for smart framework for network backup software debugging

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US14/137,774 Continuation US9244811B1 (en) 2013-12-20 2013-12-20 System and method for smart framework for network backup software debugging

Publications (2)

Publication Number Publication Date
US20160098343A1 true US20160098343A1 (en) 2016-04-07
US9977726B2 US9977726B2 (en) 2018-05-22

Family

ID=55086138

Family Applications (2)

Application Number Title Priority Date Filing Date
US14/137,774 Active 2034-05-20 US9244811B1 (en) 2013-12-20 2013-12-20 System and method for smart framework for network backup software debugging
US14/968,773 Active 2034-03-27 US9977726B2 (en) 2013-12-20 2015-12-14 System and method for smart framework for network backup software debugging

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US14/137,774 Active 2034-05-20 US9244811B1 (en) 2013-12-20 2013-12-20 System and method for smart framework for network backup software debugging

Country Status (1)

Country Link
US (2) US9244811B1 (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10270654B2 (en) 2016-08-19 2019-04-23 Bank Of America Corporation System for increasing computing efficiency of communication between applications running on networked machines
US10459811B2 (en) 2016-08-19 2019-10-29 Bank Of America Corporation System for increasing intra-application processing efficiency by transmitting failed processing work over a processing recovery network for resolution
US10180881B2 (en) 2016-08-19 2019-01-15 Bank Of America Corporation System for increasing inter-application processing efficiency by transmitting failed processing work over a processing recovery network for resolution

Citations (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6035412A (en) * 1996-03-19 2000-03-07 Emc Corporation RDF-based and MMF-based backups
US20030155415A1 (en) * 2001-12-28 2003-08-21 Kimberly-Clark Worldwide, Inc. Communication between machines and feed-forward control in event-based product manufacturing
US20050015667A1 (en) * 2003-06-30 2005-01-20 Aaron Jeffrey A. Automated diagnosis for electronic systems
US20060048004A1 (en) * 2004-08-30 2006-03-02 Norimi Kawashima Log collecting apparatus, image forming apparatus and computer-readable storage medium
US20060174165A1 (en) * 2005-02-03 2006-08-03 Cisco Technology, Inc. System and method for tracing and logging for software module
US20060294423A1 (en) * 2005-06-23 2006-12-28 Cisco Technology, Inc. System and method for debugging an application
US20070164846A1 (en) * 2005-12-16 2007-07-19 Pedolsky Richard J Interactive knowledge card system
US20080148239A1 (en) * 2003-12-30 2008-06-19 Petrov Miroslav R System and method for integrated logging and tracing functions in an enterprise network
US20090089761A1 (en) * 2007-09-28 2009-04-02 International Business Machines Corporation Method, system and computer program for debugging software applications in a web environment
US20090106741A1 (en) * 2007-10-19 2009-04-23 Oracle International Corporation Unified tracing service
US20090133041A1 (en) * 2007-11-15 2009-05-21 Shahriar Rahman Method and apparatus for automatic debugging technique
US20090319621A1 (en) * 2008-06-24 2009-12-24 Barsness Eric L Message Flow Control in a Multi-Node Computer System
US20110320884A1 (en) * 2010-06-29 2011-12-29 Oracle International Corporation Request based logging
US20120072394A1 (en) * 2010-09-16 2012-03-22 Mimosa Systems, Inc. Determining database record content changes
US20120137181A1 (en) * 2010-11-30 2012-05-31 International Business Machines Corporation Preventing log wrap with debug scripts
US20120215907A1 (en) * 2011-02-22 2012-08-23 Intuit Inc. Systems and methods for self-adjusting logging of log messages
US20130014088A1 (en) * 2011-07-07 2013-01-10 Oracle International Corporation Continuous query language (cql) debugger in complex event processing (cep)
US20130171960A1 (en) * 2011-12-29 2013-07-04 Anil Kandregula Systems, methods, apparatus, and articles of manufacture to measure mobile device usage
US20140007119A1 (en) * 2012-06-29 2014-01-02 International Business Machines Corporation Dynamically Adjusting a Log Level of a Transaction
US20140149576A1 (en) * 2012-11-29 2014-05-29 Vladimir Pavlov Managing Application Log Levels in Cloud Environment
US20140282418A1 (en) * 2013-03-15 2014-09-18 Ab Initio Technology Llc Recording program execution
US9165001B1 (en) * 2012-12-19 2015-10-20 Emc Corporation Multi stream deduplicated backup of collaboration server data

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7028225B2 (en) * 2001-09-25 2006-04-11 Path Communications, Inc. Application manager for monitoring and recovery of software based application processes
US7231633B2 (en) * 2003-07-15 2007-06-12 Lsi Corporation Debugging with set verbosity level during read and analysis of executable code and associated comments while logging according to set verbosity level
US20110246642A1 (en) * 2006-03-31 2011-10-06 Cohen Alexander J Aggregating network activity using software provenance data
US7676699B2 (en) * 2006-04-28 2010-03-09 Microsoft Corporation Event trace conditional logging
US9582394B2 (en) * 2009-07-30 2017-02-28 Oracle International Corporation Encapsulating and managing diagnostic information
US8752017B2 (en) * 2010-05-17 2014-06-10 Salesforce.Com, Inc. Method and system for remote debug protocol proxying for production debugging; selective session and user routing for debugging in multi-tenant cloud computing infrastructure
US8850133B1 (en) * 2011-12-20 2014-09-30 Emc Corporation Using dynamic block sizes in data transfer operations
US9363190B2 (en) * 2013-07-31 2016-06-07 Manjrasoft Pty. Ltd. System, method and computer program product for energy-efficient and service level agreement (SLA)-based management of data centers for cloud computing

Patent Citations (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6035412A (en) * 1996-03-19 2000-03-07 Emc Corporation RDF-based and MMF-based backups
US20030155415A1 (en) * 2001-12-28 2003-08-21 Kimberly-Clark Worldwide, Inc. Communication between machines and feed-forward control in event-based product manufacturing
US20050015667A1 (en) * 2003-06-30 2005-01-20 Aaron Jeffrey A. Automated diagnosis for electronic systems
US20080148239A1 (en) * 2003-12-30 2008-06-19 Petrov Miroslav R System and method for integrated logging and tracing functions in an enterprise network
US20060048004A1 (en) * 2004-08-30 2006-03-02 Norimi Kawashima Log collecting apparatus, image forming apparatus and computer-readable storage medium
US20060174165A1 (en) * 2005-02-03 2006-08-03 Cisco Technology, Inc. System and method for tracing and logging for software module
US20060294423A1 (en) * 2005-06-23 2006-12-28 Cisco Technology, Inc. System and method for debugging an application
US20070164846A1 (en) * 2005-12-16 2007-07-19 Pedolsky Richard J Interactive knowledge card system
US20090089761A1 (en) * 2007-09-28 2009-04-02 International Business Machines Corporation Method, system and computer program for debugging software applications in a web environment
US20090106741A1 (en) * 2007-10-19 2009-04-23 Oracle International Corporation Unified tracing service
US20090133041A1 (en) * 2007-11-15 2009-05-21 Shahriar Rahman Method and apparatus for automatic debugging technique
US20090319621A1 (en) * 2008-06-24 2009-12-24 Barsness Eric L Message Flow Control in a Multi-Node Computer System
US20110320884A1 (en) * 2010-06-29 2011-12-29 Oracle International Corporation Request based logging
US20120072394A1 (en) * 2010-09-16 2012-03-22 Mimosa Systems, Inc. Determining database record content changes
US20120137181A1 (en) * 2010-11-30 2012-05-31 International Business Machines Corporation Preventing log wrap with debug scripts
US20120215907A1 (en) * 2011-02-22 2012-08-23 Intuit Inc. Systems and methods for self-adjusting logging of log messages
US20130014088A1 (en) * 2011-07-07 2013-01-10 Oracle International Corporation Continuous query language (cql) debugger in complex event processing (cep)
US20130171960A1 (en) * 2011-12-29 2013-07-04 Anil Kandregula Systems, methods, apparatus, and articles of manufacture to measure mobile device usage
US20140007119A1 (en) * 2012-06-29 2014-01-02 International Business Machines Corporation Dynamically Adjusting a Log Level of a Transaction
US20140149576A1 (en) * 2012-11-29 2014-05-29 Vladimir Pavlov Managing Application Log Levels in Cloud Environment
US9165001B1 (en) * 2012-12-19 2015-10-20 Emc Corporation Multi stream deduplicated backup of collaboration server data
US20140282418A1 (en) * 2013-03-15 2014-09-18 Ab Initio Technology Llc Recording program execution

Also Published As

Publication number Publication date
US9977726B2 (en) 2018-05-22
US9244811B1 (en) 2016-01-26

Similar Documents

Publication Publication Date Title
US11914486B2 (en) Cloning and recovery of data volumes
US20160335361A1 (en) Historical data replay utilizing a computer system
US9904696B2 (en) Automatic table cleanup for relational databases
US9026751B2 (en) Management computer used to construct backup configuration of application data
US10726042B2 (en) Replication control using eventually consistent meta-data
JP2004227359A (en) Operation management method for storage system based on policy
US20160156711A1 (en) Centralized device management system for monitoring and controlling various application specific network components across data centers
JP2010146306A (en) Configuration monitoring system and configuration monitoring method
JP2009288836A (en) System failure recovery method of virtual server, and its system
US10061533B1 (en) Data protection tiering
US9672113B1 (en) Data recovery from multiple data backup technologies
US9977726B2 (en) System and method for smart framework for network backup software debugging
US9639701B1 (en) Scheduling data protection operations based on data activity
US20190340086A1 (en) Pluggable recovery in a data protection system
WO2012101531A1 (en) Data integrity protection in storage volumes
JP2017167811A (en) Backup controller, backup controlling method, and program
US8972352B1 (en) Probe based backup
US20200167179A1 (en) Cloud platform integration load balancer
US11561681B2 (en) System and method of smart framework for troubleshooting performance issues
CN109815233A (en) A kind of processing method and system of tables of data
US20130006936A1 (en) Capturing an archiving snapshot
JP5466740B2 (en) System failure recovery method and system for virtual server
US20240020209A1 (en) Automatically implementing a specification of a data protection intent
EP4325365A1 (en) Monitoring energy consumption associated with users of a distributed computing system using tracing
US8788462B1 (en) Multi-factor probe triggers

Legal Events

Date Code Title Description
AS Assignment

Owner name: EMC CORPORATION, MASSACHUSETTS

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:KULKARNI, GURURAJ;MANDIC, VLADIMIR;SIGNING DATES FROM 20140131 TO 20140211;REEL/FRAME:037287/0926

AS Assignment

Owner name: THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT, TEXAS

Free format text: SECURITY AGREEMENT;ASSIGNORS:ASAP SOFTWARE EXPRESS, INC.;AVENTAIL LLC;CREDANT TECHNOLOGIES, INC.;AND OTHERS;REEL/FRAME:040136/0001

Effective date: 20160907

Owner name: CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH, AS COLLATERAL AGENT, NORTH CAROLINA

Free format text: SECURITY AGREEMENT;ASSIGNORS:ASAP SOFTWARE EXPRESS, INC.;AVENTAIL LLC;CREDANT TECHNOLOGIES, INC.;AND OTHERS;REEL/FRAME:040134/0001

Effective date: 20160907

Owner name: CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH, AS COLLAT

Free format text: SECURITY AGREEMENT;ASSIGNORS:ASAP SOFTWARE EXPRESS, INC.;AVENTAIL LLC;CREDANT TECHNOLOGIES, INC.;AND OTHERS;REEL/FRAME:040134/0001

Effective date: 20160907

Owner name: THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., A

Free format text: SECURITY AGREEMENT;ASSIGNORS:ASAP SOFTWARE EXPRESS, INC.;AVENTAIL LLC;CREDANT TECHNOLOGIES, INC.;AND OTHERS;REEL/FRAME:040136/0001

Effective date: 20160907

AS Assignment

Owner name: EMC IP HOLDING COMPANY LLC, MASSACHUSETTS

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:EMC CORPORATION;REEL/FRAME:040203/0001

Effective date: 20160906

STCF Information on status: patent grant

Free format text: PATENTED CASE

AS Assignment

Owner name: THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., T

Free format text: SECURITY AGREEMENT;ASSIGNORS:CREDANT TECHNOLOGIES, INC.;DELL INTERNATIONAL L.L.C.;DELL MARKETING L.P.;AND OTHERS;REEL/FRAME:049452/0223

Effective date: 20190320

Owner name: THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., TEXAS

Free format text: SECURITY AGREEMENT;ASSIGNORS:CREDANT TECHNOLOGIES, INC.;DELL INTERNATIONAL L.L.C.;DELL MARKETING L.P.;AND OTHERS;REEL/FRAME:049452/0223

Effective date: 20190320

AS Assignment

Owner name: THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., TEXAS

Free format text: SECURITY AGREEMENT;ASSIGNORS:CREDANT TECHNOLOGIES INC.;DELL INTERNATIONAL L.L.C.;DELL MARKETING L.P.;AND OTHERS;REEL/FRAME:053546/0001

Effective date: 20200409

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 4

AS Assignment

Owner name: WYSE TECHNOLOGY L.L.C., CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001

Effective date: 20211101

Owner name: SCALEIO LLC, MASSACHUSETTS

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001

Effective date: 20211101

Owner name: MOZY, INC., WASHINGTON

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001

Effective date: 20211101

Owner name: MAGINATICS LLC, CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001

Effective date: 20211101

Owner name: FORCE10 NETWORKS, INC., CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001

Effective date: 20211101

Owner name: EMC IP HOLDING COMPANY LLC, TEXAS

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001

Effective date: 20211101

Owner name: EMC CORPORATION, MASSACHUSETTS

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001

Effective date: 20211101

Owner name: DELL SYSTEMS CORPORATION, TEXAS

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001

Effective date: 20211101

Owner name: DELL SOFTWARE INC., CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001

Effective date: 20211101

Owner name: DELL PRODUCTS L.P., TEXAS

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001

Effective date: 20211101

Owner name: DELL MARKETING L.P., TEXAS

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001

Effective date: 20211101

Owner name: DELL INTERNATIONAL, L.L.C., TEXAS

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001

Effective date: 20211101

Owner name: DELL USA L.P., TEXAS

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001

Effective date: 20211101

Owner name: CREDANT TECHNOLOGIES, INC., TEXAS

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001

Effective date: 20211101

Owner name: AVENTAIL LLC, CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001

Effective date: 20211101

Owner name: ASAP SOFTWARE EXPRESS, INC., ILLINOIS

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001

Effective date: 20211101

AS Assignment

Owner name: SCALEIO LLC, MASSACHUSETTS

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (040136/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061324/0001

Effective date: 20220329

Owner name: EMC IP HOLDING COMPANY LLC (ON BEHALF OF ITSELF AND AS SUCCESSOR-IN-INTEREST TO MOZY, INC.), TEXAS

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (040136/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061324/0001

Effective date: 20220329

Owner name: EMC CORPORATION (ON BEHALF OF ITSELF AND AS SUCCESSOR-IN-INTEREST TO MAGINATICS LLC), MASSACHUSETTS

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (040136/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061324/0001

Effective date: 20220329

Owner name: DELL MARKETING CORPORATION (SUCCESSOR-IN-INTEREST TO FORCE10 NETWORKS, INC. AND WYSE TECHNOLOGY L.L.C.), TEXAS

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (040136/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061324/0001

Effective date: 20220329

Owner name: DELL PRODUCTS L.P., TEXAS

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (040136/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061324/0001

Effective date: 20220329

Owner name: DELL INTERNATIONAL L.L.C., TEXAS

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (040136/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061324/0001

Effective date: 20220329

Owner name: DELL USA L.P., TEXAS

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (040136/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061324/0001

Effective date: 20220329

Owner name: DELL MARKETING L.P. (ON BEHALF OF ITSELF AND AS SUCCESSOR-IN-INTEREST TO CREDANT TECHNOLOGIES, INC.), TEXAS

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (040136/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061324/0001

Effective date: 20220329

Owner name: DELL MARKETING CORPORATION (SUCCESSOR-IN-INTEREST TO ASAP SOFTWARE EXPRESS, INC.), TEXAS

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (040136/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061324/0001

Effective date: 20220329

AS Assignment

Owner name: SCALEIO LLC, MASSACHUSETTS

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (045455/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061753/0001

Effective date: 20220329

Owner name: EMC IP HOLDING COMPANY LLC (ON BEHALF OF ITSELF AND AS SUCCESSOR-IN-INTEREST TO MOZY, INC.), TEXAS

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (045455/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061753/0001

Effective date: 20220329

Owner name: EMC CORPORATION (ON BEHALF OF ITSELF AND AS SUCCESSOR-IN-INTEREST TO MAGINATICS LLC), MASSACHUSETTS

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (045455/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061753/0001

Effective date: 20220329

Owner name: DELL MARKETING CORPORATION (SUCCESSOR-IN-INTEREST TO FORCE10 NETWORKS, INC. AND WYSE TECHNOLOGY L.L.C.), TEXAS

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (045455/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061753/0001

Effective date: 20220329

Owner name: DELL PRODUCTS L.P., TEXAS

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (045455/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061753/0001

Effective date: 20220329

Owner name: DELL INTERNATIONAL L.L.C., TEXAS

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (045455/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061753/0001

Effective date: 20220329

Owner name: DELL USA L.P., TEXAS

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (045455/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061753/0001

Effective date: 20220329

Owner name: DELL MARKETING L.P. (ON BEHALF OF ITSELF AND AS SUCCESSOR-IN-INTEREST TO CREDANT TECHNOLOGIES, INC.), TEXAS

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (045455/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061753/0001

Effective date: 20220329

Owner name: DELL MARKETING CORPORATION (SUCCESSOR-IN-INTEREST TO ASAP SOFTWARE EXPRESS, INC.), TEXAS

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (045455/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061753/0001

Effective date: 20220329